Women's Global Leadership Summit 2018

WOM1826 - Debunking Common Cyber Security Myths & Lessons Learned from the Underground

Nov 16, 2018 12:30pm ‐ Nov 16, 2018 1:20pm


Description

Criminals that profit from account takeover (ATO) attacks have been running rampant with no concern for the consequences. But we now have the power to cause them to pause and think twice regarding taking over accounts. We will share details of the account takeover timeline, when criminals are the most effective and what you can do to protect yourself using various technologies. We will also share how this type of data can be used against criminals - to find both cyber and physical threat actors.

  • Learn best practices to protect yourself from the threat of account takeover.
  • Understand limitations of common security practices and how to overcome the weaknesses.
  • Discuss overall security hygiene and how to incorporate this into our daily routine.

Speaker(s):

Tags: SKA

You must be logged in and own this session in order to post comments.